Approved algorithmic security enhancement of stream cipher for advanced mobile communications
暂无分享,去创建一个
[1] Irene Marquez Corbella,et al. Fault Analysis of the Stream Cipher Snow 3G , 2009, 2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC).
[2] Risto M. Hakala,et al. Consecutive S-box Lookups: A Timing Attack on SNOW 3G , 2010, ICICS.
[3] Israel Koren,et al. Workshop on fault diagnosis and tolerance in cryptography , 2004, International Conference on Dependable Systems and Networks, 2004.
[4] Amr M. Youssef,et al. On the sliding property of SNOW 3 G and SNOW 2.0 , 2011, IET Inf. Secur..
[5] Taraneh Eghlidos,et al. Improved Heuristic guess and determine attack on SNOW 3G stream cipher , 2014, 7'th International Symposium on Telecommunications (IST'2014).
[6] Mufeed Al Mashrafi. A different algebraic analysis of the ZUC stream cipher , 2011, SIN 2011.
[7] Bin Zhang,et al. Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G (+) , 2010, ACNS.
[8] Tao Huang,et al. Differential Attacks against Stream Cipher ZUC , 2012, ASIACRYPT.
[9] Camel Tanougast,et al. Combined and Robust SNOW-ZUC Algorithm Based on Chaotic System , 2018, 2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security).
[10] Jie Cui,et al. AN IMPROVED AES S-BOX AND ITS PERFORMANCE ANALYSIS , 2011 .
[11] Run-hua Shi,et al. Generation and Optimization of Rijndael S-box Equation System , 2014 .
[12] Camel Tanougast,et al. FPGA implementation of an enhanced SNOW-3G stream cipher based on a hyperchaotic system , 2017, 2017 4th International Conference on Control, Decision and Information Technologies (CoDIT).
[13] Talaat A. Elgarf,et al. Modifying authentication techniques in mobile communication systems , 2014, 2014 Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).
[14] Mufeed Juma AlMashrafi. A different algebraic analysis of the ZUC stream cipher , 2011, SIN '11.
[15] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[16] Camel Tanougast,et al. Digital Implementation of an Improved LTE Stream Cipher Snow-3G Based on Hyperchaotic PRNG , 2017, Secur. Commun. Networks.